Last week, Darrell Arms and I presented a webinar and white paper on Incident Response: Six Best Practices for Managing Cyber Breaches. Executives are quickly understanding that it is virtually impossible to completely avoid a network breach. You need to be equipped to take immediate action when a breach occurs, as business operations must continue and network connectivity to the rest of the world is essential. As discussed in the blog post The Road to CEIC 2013: Cybersecurity 101, cybersecurity is a fast-growing field with many opportunities to contribute to a safer cyber world.
The Cyber-threat Response and Management track at @CEIC_Conf #CEIC will provide you with information to help you achieve three key business objectives:
- Mitigate RISK
- Reduce the TIME
- Reduce the COST
- Mitigate the RISK of successful attacks through rapid validation, comprehensive scope assessment, and containment of security incidents
- Eliminate the TIME delay between compromise, detection, and response
- Reduce the COST and overhead of incident response by leveraging existing people and technologies
- Mitigate the RISK of sensitive data in unauthorized locations
- Reduce the TIME it takes to locate sensitive data and enforce regulatory and policy compliance
- Reduce the COST associated with data discovery processes that don’t easily scale and lack definitive enforcement
Another hot topic in cybersecurity is integration with best-of-breed tools for malware detection and incident response. Check out Speed Up Your IR Investigations with IOC's from FireEye with Sam Yoon of FireEye. In this session, you will learn to leverage threat-related information from FireEye MPS and your current EnCase knowledge to conduct faster, conclusive Incident Response investigations. Also, you will not want to miss to two sessions on the leading edge technology of EnCase® Cybersecurity: Endpoint Analytics with EnCase Cybersecurity and Shaking up the Security Stack: The Future of EnCase Cybersecurity. Look for more announcements on these presentations at CEIC.
Cyber-threat Response and Management track:
- Hunting for Unfriendly Easter Eggs
- A Year in the Life of an MD5
- Responding to a Cyber Security Incident
- You Can Panic now -- A DFIR Look at APT-Based Attack
- How the World will End: The Spy is in the Cybersphere
- Developing a Capability-Driven IR Program
- How CISOs and General Counsels are Quickly Becoming Best Friends
- Endpoint Analytics with EnCase Cybersecurity
- Speed Up Your IR Investigations with IOC's from FireEye
- Shaking up the Security Stack: The Future of EnCase Cybersecurity
Jessica Bair
Senior Director, Curriculum Development
@jessicambair
No comments :
Post a Comment